Lifesize, Inc. v. Chimene
Filing
59
ORDER GRANTING IN PART AND DENYING IN PART 13 Motion to Dismiss. Signed by Judge Robert Pitman. (ml)
IN THE UNITED STATES DISTRICT COURT
FOR THE WESTERN DISTRICT OF TEXAS
AUSTIN DIVISION
LIFESIZE, INC.,
Plaintiff,
v.
BEAU CHIMENE,
Defendant.
§
§
§
§
§
§
§
§
§
1:16-CV-1109-RP
ORDER
Before the Court is Defendant Beau Chimene’s Motion to Dismiss, (Dkt. 13). Having
reviewed the pleadings, the relevant case law, and the factual record, the Court issues the following
order.
BACKGROUND
Plaintiff Lifesize, Inc. (“Plaintiff”) is a Delaware corporation with its principal place of
business in Austin, Texas. Plaintiff is in the business of developing hardware, software, and
equipment for audio, web, and video conferencing and related services. Defendant Beau Chimene
(“Defendant”) is an individual residing in Austin, Texas. He was an employee of Plaintiff’s
purported predecessor in interest, Lifesize Communications, Inc., formerly known as KMV
Technologies Inc. He is currently employed by Logitech.
Defendant began working for KMV Technologies (“KMV”) as a senior engineer on
February 23, 2004. In this capacity, he managed a team that developed and maintained the
company’s audio subsystems, hardware, and software and was privy to sensitive technological
information. As a condition of his employment, Defendant executed an Employee Proprietary
Information and Inventions Agreement (“Inventions Agreement”). The Inventions Agreement
provided, among other things, that Defendant would keep confidential KMV’s proprietary and
confidential information during his employment and at all times thereafter, and that he would assign
to KMV all intellectual property he developed during his employment. It also required him to return
all company property upon the termination of his employment. The Inventions Agreement stated
that these obligations would bind Defendant’s successors and be for the benefit of KMV, its
successors, and its assigns.
At some point thereafter, KMV changed its name to Lifesize Communications, Inc. (“LCI”).
LCI was acquired by Logitech in 2009 and continued its business first as a subsidiary and later as a
division of Logitech. Defendant asserts that he became an employee of Logitech in January 2010
and was required to sign an “Employee Agreement Regarding Proprietary Information and
Inventions” (the “2009 Employee Agreement”) that had provisions similar to those in Defendant’s
2004 Inventions Agreement with KMV.
After the acquisition of LCI by Logitech, Defendant continued to serve as manager of the
audio team for the LCI subsidiary. During this time, Defendant led the effort to make significant
developments of LCI’s speakerphone and related products. Two years of these efforts culminated in
the release of LCI’s second-generation speakerphone on February 28, 2012. According to Plaintiff,
LCI’s second-generation speakerphone represented a significant advancement in the quality and
performance of speakerphones.
Plaintiff alleges that, unbeknownst to the LCI team, Logitech had another team concurrently
developing a speakerphone and videoconferencing system that would compete directly with LCI’s
second-generation speakerphone and videoconferencing system. Logitech announced its system, the
ConferenceCam CC3000e (“the CC3000e”), in January 2014. According to Plaintiff, the CC3000e
was plagued with problems, received poor reviews, and was generally perceived to be an inferior
product compared to LCI’s system. Following the purportedly unsuccessful release of the CC3000e,
Plaintiff alleges that Logitech employees responsible for the CC3000e’s development began reaching
2
out to LCI’s employees, including Defendant, to seek advice on how to improve the performance of
their product. The LCI management was reluctant to share its intellectual property to assist in the
development of a competing product. When Defendant sought approval to share information with
Logitech employees, LCI management denied his request.
In or around October 2014, Defendant tendered his resignation from his employment at
Logitech, indicating that he would leave his position at LCI to pursue other interests. Defendant
retained a company-issued laptop and two engineering notebooks when he left.
In December 2015, Logitech spun off Lifesize, Inc., Plaintiff here, as a separate business
entity. The record shows that Plaintiff is distinct from LCI, which remains fully owned by Logitech,
though it appears Plaintiff carries on largely the same business which LCI had previously. As part of
the spin-off, the parties executed an Intellectual Property Agreement (the “2015 IPA”), transferring
certain technology and intellectual property (“IP”) from Logitech and its affiliates (presumably
including LCI) to Plaintiff and licensing a portion of the transferred IP back to Logitech. The IP
encompassed within this agreement was all IP relating to Plaintiff’s business, including
videoconferencing devices such as its second-generation speakerphone.
Shortly after the spin-off, Plaintiff became aware that Defendant had accepted employment
with Logitech. Plaintiff alleges that Defendant was or is working on Logitech’s conference room
products. Concerned that Defendant may be using its confidential information to develop
competing products, Plaintiff requested written confirmation from Defendant that he would not
disclose any confidential information to Logitech, that he had not retained any material containing
its confidential information, and that he is not developing or assisting in the development of audio
hardware, software, or subsystems for Logitech’s competing products. Plaintiff received a response
from Logitech’s Deputy General Counsel on April 20, 2016. The response indicated that Defendant
had not retained any of Plaintiff’s materials and that Logitech had instructed Defendant not to
3
disclose any confidential information in his work at Logitech. It contained no response to Plaintiff’s
request that Defendant not work on competing videoconferencing products.
On May 4, 2016, Logitech’s outside counsel contacted Plaintiff and revealed that Defendant
had retained the laptop and two engineering notebooks that had been provided to Defendant while
he was working at LCI. According to Plaintiff, Defendant used these items during the time he was
engaged in developing LCI’s second-generation speakerphone. Logitech returned the notebooks on
or around May 23, 2016. Plaintiff alleges that the notebooks contained a trove of trade secrets from
four years of Defendant’s work at LCI. Logitech also returned the laptop, but not before Defendant
provided it to Logitech’s computer forensics expert, who deleted all files created or modified after
November 17, 2014—a date roughly coinciding with the end of Defendant’s work with LCI. The
forensics expert also copied the deleted files, and has so far allegedly prevented Plaintiff from
accessing them.
Plaintiff alleges that Logitech has refused its requests to reassign Defendant to work in an
area that would not risk the disclosure of Plaintiff’s trade secrets, and that Logitech refuses to
provide assurances that Defendant is not working on developing competing products. Plaintiff
asserts that Logitech has taken the position that it is entitled to use Plaintiff’s IP in the creation of its
competing products, pursuant to the terms of the IP Agreement executed as part of the spin-off of
Plaintiff from Logitech.
Plaintiff has filed the instant lawsuit against Defendant, though not Logitech, alleging
misappropriation of trade secrets, breach of contract, theft, conversion, trespass to personal
property, and violation of the Computer Fraud and Abuse Act, 18 U.S.C. § 1030. Defendant moves
to dismiss these claims under Rules 12(b)(1) and 12(b)(6), arguing that the Plaintiff lacks standing to
assert them and, alternatively, that the allegations fail to state a claim on which relief may be granted.
4
LEGAL STANDARD
I.
Rule 12(b)(1)
A motion to dismiss under Federal Rule of Civil Procedure 12(b)(1) calls into question the
federal court’s subject-matter jurisdiction. There are three avenues for a movant to demonstrate a
lack of jurisdiction: (1) on the face of the complaint alone; (2) the complaint supplemented by
undisputed facts in the record; and (3) the complaint supplemented by undisputed facts and the
court’s resolution of disputed facts. Montez v. Dep’t of Navy, 392 F.3d 147, 149 (5th Cir. 2004). The
burden of demonstrating that jurisdiction exists rests at all times with the party invoking the court’s
jurisdiction. Ramming v. United States, 281 F.3d 158, 161 (5th Cir. 2001).
Where a jurisdictional challenge is raised, the court is generally “free to weigh the evidence
and resolve factual disputes in order to satisfy itself that it has the power to hear the case.” Montez,
392 F.3d at 149. “However, where issues of fact are central both to subject matter jurisdiction and
the claim on the merits, . . . the trial court must assume jurisdiction and proceed to the merits.” Id. at
150 (finding that the issue of respondeat superior was central to plaintiffs’ negligence claim and
inappropriate for resolution under Rule 12(b)(1)).
II.
Rule 12(b)(6)
When evaluating a motion to dismiss for failure to state a claim under Rule 12(b)(6) the
complaint must be liberally construed in favor of the plaintiff and all facts pleaded therein must be
taken as true. Leatherman v. Tarrant Cty. Narcotics Intelligence & Coordination Unit, 507 U.S. 163, 164
(1993); Baker v. Putnal, 75 F.3d 190, 196 (5th Cir. 1996). Although Federal Rule of Civil Procedure 8
mandates only that a pleading contain a “short and plain statement of the claim showing that the
pleader is entitled to relief,” this standard demands more than unadorned accusations, “labels and
conclusions,” “a formulaic recitation of the elements of a cause of action,” or “naked assertion[s]”
devoid of “further factual enhancement.” Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555 (2007). Rather,
5
a complaint must contain sufficient factual matter, accepted as true, to state a claim to relief that is
plausible on its face. Id. at 570. “A claim has facial plausibility when the plaintiff pleads factual
content that allows the court to draw the reasonable inference that the defendant is liable for the
misconduct alleged.” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009).
The court must initially identify pleadings that are no more than legal conclusions not
entitled to the assumption of truth, then assume the veracity of well-pleaded factual allegations and
determine whether those allegations plausibly give rise to an entitlement to relief. If not, the
complaint has alleged—but it has not show[n]—that the pleader is entitled to relief. Iqbal, 556 U.S.
at 679 (quoting Fed. R. Civ. P. 8(a)(2)). Throughout this process, the court “must consider the
complaint in its entirety, as well as other sources courts ordinarily examine when ruling on Rule
12(b)(6) motions to dismiss, in particular, documents incorporated into the complaint by reference,
and matters of which a court may take judicial notice.” Tellabs, Inc. v. Makor Issues & Rights, Ltd., 551
U.S. 308, 322 (2007).
DISCUSSION
The Court first addresses Defendant’s jurisdictional arguments and then turns to
Defendant’s motion to dismiss for failure to state a claim.
I.
Defendant’s Rule 12(b)(1) Motion
Defendant argues that the Court has no subject-matter jurisdiction over this case because
Plaintiff lacks standing to pursue its claims. Standing, of course, is an indispensable component of
subject-matter jurisdiction. Roman Catholic Diocese of Dall. v. Sebelius, 927 F. Supp. 2d 406, 415 (N.D.
Tex. 2013) (citing Xerox Corp. v. Genmoora Corp., 888 F.2d 345, 350 (5th Cir. 1989)). Thus, if Plaintiff
indeed lacks standing, the Court must dismiss its claims.
Defendant’s standing arguments go to each of Plaintiff’s claims and primarily arise from the
peculiar history and relationship between Logitech and Plaintiff. For example, with respect to
6
Plaintiff’s theft, conversion, breach of contract, and Computer Fraud and Abuse Act claims—
predicated largely on Defendant’s retention of a laptop and two engineering notebooks—Defendant
argues that Plaintiff lacks standing because Logitech, not Plaintiff, purchased and owns those items.
Similarly, Defendant argues that Logitech, not Plaintiff, holds the rights arising under his 2004
Inventions Agreement with KMV, and that Plaintiff cannot assert a claim for breach of that contract
because it was never assigned to Plaintiff. Finally, Defendant alleges that Plaintiff can assert no claim
for misappropriation of trade secrets because Plaintiff “never employed [Defendant] and never
owned the Laptop and notebooks,” and thus presumably cannot establish that Defendant
wrongfully acquired Plaintiff’s trade secrets. (Def.’s Mot. Dismiss, Dkt. 13, at 9). The Court will
evaluate each of Defendant’s arguments in turn.
A.
Counts 1 & 2: Misappropriation of Trade Secrets
Defendant’s arguments concerning Plaintiff’s lack of standing to assert misappropriation of
trade secrets claims are a bit unclear. While he argues that a plaintiff can bring a misappropriation
claim under state and federal law only if he or she has an enforceable property interest in a trade
secret, he does not seem to contest that Plaintiff here has some enforceable property interest in the
trade secrets at issue. Instead, Defendant appears to argue that he did not obtain the trade secrets
stored within the laptop and notebooks by improper means because Logitech, not Plaintiff, owned
those items, and because Logitech, not Plaintiff, was his employer and owner of the trade secrets
when he accessed them.
To the extent Defendant does contest Plaintiff’s ownership of the trade secrets, it is clear
from the record that Logitech transferred to Plaintiff the trade secrets that form the basis of
Plaintiff’s claims. The 2015 IPA between Logitech and Plaintiff provided that “Logitech . . . hereby
transfers, assigns and conveys to Company all of Logitech’s right, title and interest in and to (i) the
Transferred Patents, Transferred Trademarks and Transferred Other IP . . . and (ii) the Transferred
7
Technology. . . .” (2015 IPA, Dkt. 13-4, at 99). Transferred Other IP is defined as “items of Other
IP owned by Logitech or any of its Affiliates . . . and that are embodied by any Technology listed on
Schedule D.” (Id.). Other IP is, in turn, defined as “Intellectual Property Rights other than Patents,
Domain Names and Trademarks.” Next, the 2015 IPA defines Intellectual Property Rights as “all
rights arising out of the following . . . (i) patents . . . (ii) trade-secret rights and all other rights in confidential
business or technical information, (iii) copyrights . . . (iv) domain names . . . and (v) any similar or
equivalent rights to any of the foregoing . . . .” (Id. at 97–98 (emphasis added)). Schedule D to the
2015 IPA, which defines the class of Transferred Other IP, includes the second-generation
speakerphone that is at issue here. (Schedule D, Dkt. 18-7, at 41). Thus, the 2015 IPA
unambiguously (though perhaps convolutedly) transfers from Logitech to Plaintiff the trade secrets
relevant to Plaintiff’s second-generation speakerphone.
Defendant’s remaining arguments concerning the entity that employed him and owned the
laptop and notebooks address whether Defendant acquired the trade secrets through improper
means. (See Def,’s Mot. Dismiss, Dkt. 13, at 7 (“[Plaintiff’s] misappropriation of trade secrets claims
are premised on the allegation that [Defendant] acquired through improper means [Plaintiff’s] trade
secrets, breaching contractual duties to return notebooks and the Laptop.”)). As such, these are
arguments of contested facts attacking an essential element of Plaintiff’s claim and are
inappropriately considered on a Rule 12(b)(1) motion. See Arbaugh v. Y&H Corp., 546 U.S. 500, 514
(2006) (“[I]f subject-matter jurisdiction turns on contested facts, the trial judge may be authorized to
review the evidence and resolve the dispute on her own . . . . If satisfaction of an essential element
of a claim for relief is at issue, however, the jury is the proper trier of contested facts.”); Tex. Civ.
Prac. & Rem. Code § 134A.002(3) (listing improper acquisition of a trade secrets a non-exclusive
basis for liability for misappropriation).
8
The Court is thus concludes that it is appropriate to proceed with Plaintiff’s trade secret
claims.
B.
Count 3: Breach of Contract
Defendant argues that Plaintiff lacks standing to pursue its claims on his 2004 Inventions
Agreement with KMV because Plaintiff is not a party, assignee, successor in interest, or third-party
beneficiary to the contract. Plaintiff responds that the issue of privity is a merits-based issue
inappropriate for resolution on a Rule 12(b)(1) motion. Plaintiff further asserts that, in any case, it is
in privity with KMV both because the 2004 Inventions Agreement was assigned to Plaintiff via the
2015 IPA and because Plaintiff is a successor in interest to KMV.
The Court agrees with Plaintiff that, at least under Texas law, the question of privity goes the
merits of its claim. A Texas Court of Appeals recently stated:
[A] challenge to a party’s privity of contract is a challenge to capacity, not standing,
and requires compliance with rule 93 of the Texas Rules of Civil Procedure. While
the question of whether a party is entitled to sue on a contract is often informally
referred to as a question of “standing,” it is not truly a standing issue because it does
not affect the jurisdiction of the court; it is, instead, a decision on the merits. When it
is established that a breach of contract plaintiff lacks entitlement to sue on a
contract, the proper disposition may be summary judgment on the merits, but it is
not dismissal for want of jurisdiction.
John C. Flood of DC, Inc. v. SuperMedia, L.L.C., 408 S.W.3d 645, 651 (Tex. App.—Dallas 2013, pet.
denied) (internal quotations and citations omitted); see also Yasuda Fire & Marine Ins. Co. v. Ciraco, 225
S.W.3d 894, 898 (Tex. App.—Houston [14th Dist.] 2007, no pet.) (“Although lawyers and courts
occasionally state informally that an entity has no ‘standing’ to enforce a contract if that entity is not
a party to the contract or a third-party beneficiary to it, such an entity’s inability to sue goes to the
merits and does not deprive courts of jurisdiction.”). As the issue of Plaintiff’s privity goes to the
merits of its claims, it is inappropriate for resolution under Rule 12(b)(1). 1
1
The conclusion that privity is not jurisdictional is bolstered by the fact that a challenge to privity
may be waived if not properly asserted. See M & E Endeavors LLC v. Cintex Wireless LLC, No. 01-159
Even if the Court were to find that privity is jurisdictional in this case, it would conclude that
Plaintiff has sufficiently established the likelihood that privity exists to survive the present motion to
dismiss. Defendant has produced evidence in the form of a contract between Logitech and Plaintiff
that demonstrates no manifestation of intent for Logitech to transfer the 2004 Inventions
Agreement to Plaintiff. See Harris Methodist Fort Worth v. Sales Support Servs. Inc. Emp. Health Care Plan,
426 F.3d 330, 334 (5th Cir. 2005) (“An assignment is ‘a manifestation to another person by the
owner of a right indicating his intention to transfer . . . his right to such other person or third
person.”). However, the question whether Plaintiff is a successor in interest to KMV, thus assuming
the benefit of the Inventions Agreement, presents a different inquiry. See Sitaram v. Aetna U.S.
Healthcare of N. Tex., Inc., 152 S.W.3d 817, 826 (Tex. App. 2004) (“With respect to corporations,
‘successor’ does not ordinarily mean an assignee.”). The term “successor” denotes “a corporation
which has become vested with the rights and has assumed the burdens of another corporation by
amalgamation, consolidation, or duly authorized legal succession, and does not contemplate
acquisition by ordinary purchase from another corporation.” Id.
Defendant’s evidence is lacking on this latter point, and in this regard his jurisdictional attack
on the issue is more appropriately characterized as facial. See Compass Bank v. Veytia, No. EP-11-CV228-PRM, 2011 WL 6046530, at *4 (W.D. Tex. Dec. 5, 2011). When a court evaluates a facial attack
to jurisdiction, it must “look to the sufficiency of the allegations in the complaint because they are
presumed to be true. If those jurisdictional allegations are sufficient the complaint stands.” Paterson v.
Weinberger, 644 F.2d 521, 523 (5th Cir. 1981). Plaintiff has alleged that it received the benefit of the
2004 Inventions Agreement as the successor in interest to KMV and LCI. (Compl. ¶ 20). This
suffices to demonstrate jurisdiction at this juncture. See id.
00234-CV, 2016 WL 1590642, at *4 (Tex. App. Apr. 19, 2016) (holding that defendant waived
argument that plaintiff was not in privity with contracting party); Arbaugh, 546 U.S. 500, 514 (“First,
‘subject-matter jurisdiction, because it involves a court’s power to hear a case, can never be forfeited
or waived.’”) (quoting United States v. Cotton, 535 U.S. 625, 630 (2002)).
10
Moreover, the most probative evidence the Court has found on the issue suggests that
Plaintiff indeed assumed the assets and liabilities of LCI and KMV from Logitech, thus becoming a
successor in interest to those corporations. For example, the Sale and Purchase Agreement executed
between Logitech and Plaintiff suggests that Plaintiff assumed the liabilities along with the assets set
forth in that agreement. (Sale and Purchase Agreement, Dkt. 13-3, at 22). Additionally, Logitech’s
Form 10-K for the fiscal year ended March 31, 2016, indicates that Plaintiff held the assets to
Logitech’s videoconferencing business, which Logitech presumably acquired in the transfer of assets
from LCI, prior to divestiture by Logitech. (Form 10-K, Dkt. 18-8, at 87). The 10-K also “classified
the results of Lifesize video conferencing business as discontinued operations,” which suggests that
Logitech retained no part of the business, other than perhaps certain licenses. (See id.).
In sum, a jurisdictional ruling on whether Plaintiff is in privity is unnecessary at this
point. To the extent a ruling is necessary, the allegations and evidence currently before the
Court suffice at this time to demonstrate that Plaintiff is a successor in interest to KMV and
LCI and thus has standing to sue on the 2004 Inventions Agreement. 2
2
Defendant argues for the first time in his Reply that the 2004 Inventions Agreement is irrelevant
because it was replaced by a 2009 Employment Agreement between Defendant and Logitech.
(Def.’s Reply, Dkt. 25, at 4–6). According to Defendant, the latter agreement, not the former one,
gives rise to his duty to keep confidential the information forming the basis of Plaintiff’s trade secret
claims. (Id.). Plaintiff has indicated that it is only pursuing claims under the 2004 Inventions
Agreement. (Pl.’s Sur-reply, Dkt. 36, at 2). That being the case, the Court views Defendant’s
arguments as raising questions about the scope of Defendant’s obligations under the 2004
agreement and whether Defendant’s actions can constitute a breach of the same. These issues
concern the merits of Plaintiff’s claims, not the antecedent question raised by Defendant’s motion,
which is whether Plaintiff has standing to assert claims under the 2004 Inventions Agreement. As
such, the Court finds the issues more appropriately raised in a motion under Rule 12(b)(6) or Rule
56 and will not address them here. See Williamson v. Tucker, 645 F.2d 404, 416 (5th Cir. 1981) (“No
purpose is served by indirectly arguing the merits in the context of federal jurisdiction. . . . This
refusal to treat indirect attacks on the merits as Rule 12(b)(1) motions provides, moreover, a greater
level of protection to the plaintiff who in truth is facing a challenging to the validity of his claim: the
defendant is forced to proceed under Rule 12(b)(6) . . . or Rule 56 . . . .”).
11
C.
Count 4: Conversion
Plaintiff’s conversion claims are based on Defendant’s retention of his laptop and
engineering notebooks after he resigned from his position at LCI. Defendant argues that Plaintiff
lacks standing to assert a claim for conversion because it never owned the laptop and notebooks,
which he argues were purchased by Logitech. Further, Defendant further asserts that Plaintiff’s
claims are premised on the conversion of intangible property, which is not actionable under Texas
law.
A plaintiff’s ownership of or entitlement to the property that is the subject of its conversion
claim is an express element of the cause of action. Huffmeyer v. Mann, 49 S.W.3d 554, 558 (Tex. App.
2001). As the issue is contested, it is to be decided on the merits rather than in a jurisdictional ruling.
Arbaugh, 546 U.S. at 514. Defendant’s argument that Texas law does not supply a conversion claim
for theft of intangible property concerns only whether Plaintiff has stated a valid claim, not whether
the Court has jurisdiction. See Herrera v. NBS, Inc., 759 F. Supp. 2d 858, 863 (W.D. Tex. 2010)
(“When a motion is incorrectly styled as a challenge to subject matter jurisdiction, but is in fact an
attack on the merits of the claim, the proper course of action is to analyze the motion under Rule
12(b)(6) or Rule 56.”). Accordingly, the Court will address this point in its review of Defendant’s
Rule 12(b)(6) motion below.
D.
Counts 5 & 6: Trespass to Personal Property & Theft
As with Plaintiff’s conversion claim, Defendant argues that Plaintiff can assert claims for
trespass to personal property and theft under the Texas Theft Liability Act only if it owns the
property that is the subject of that claim. Defendant again argues that Plaintiff lacks standing
because it did not own the laptop and engineering notebooks that form the basis of Plaintiff’s
claims. As discussed above, the question of ownership is intertwined with the merits of Plaintiff’s
claims and is thus inappropriate for resolution at this stage. The Court will not address this issue in
12
its analysis of Defendant’s Rule 12(b)(6) motion because it concludes Plaintiff has adequately alleged
ownership of the laptop and notebooks.
E.
Count 7: Computer Fraud and Abuse Act
Finally, Defendant argues that Plaintiff lacks standing to assert its claim under the Computer
Fraud and Abuse Act because it cannot show that Defendant lacked authorization to access his
company laptop. The jurisdictional veneer given to this argument is thinner than the others:
Defendant states directly that his challenge is to the “essential element of a CFAA claim . . . that the
[defendant] access[] a computer ‘without authorization or exceed[ing] authorized access.’” (Def.’s
Mot. Dismiss, Dkt. 13, at 13 (quoting Hunn v. Dan Wilson Homes, Inc., 789 F.3d 573, 583–84 (5th Cir.
2015)). As Defendant’s argument admittedly goes to an essential element of Plaintiff’s claim, the
Court will not resolve it here, Arbaugh, 546 U.S. at 514. The Court additionally finds it unnecessary
to address the issue in its Rule 12(b)(6) analysis because Plaintiff has sufficiently alleged ownership
of the laptop and Defendant’s lack of authorization to access it. (Compl., Dkt. 1, ¶¶ 68, 79, 96–102).
Having disposed of Defendant’s jurisdictional challenge, the Court now turns to Defendant’s
motion under Rule 12(b)(6).
II.
Defendant’s Rule 12(b)(6) Motion
While the Court is empowered to consider and weigh evidence when evaluating a Rule
12(b)(1) motion, now that the sufficiency of the Plaintiff’s pleadings is at issue under Rule 12(b)(6),
the Court must confine its inquiry to the facts alleged in the Complaint, considering only such other
documents as are incorporated in the Complaint by reference 3 or which are the proper subject of
judicial notice. Turner Indus. Grp., LLC v. Int’l Union of Operating Eng’rs, Local 450, 8 F. Supp. 3d 875,
882 (S.D. Tex. 2014) (citing Lone Star Fund V (U.S.), L.P. v. Barclay’s Bank PLC, 594 F.3d 383, 387
3
In its Complaint, Plaintiff referenced the 2004 Inventions Agreement, (Compl. ¶ 20), and the spinoff agreements including the 2015 IPA. (Id. ¶ 40).
13
(5th Cir. 2010)). Keeping the limited scope of this inquiry in mind, the Court addresses each of the
Plaintiff’s claims.
A.
Counts 1 & 2: Misappropriation of Trade Secrets
The Texas Uniform Trade Secrets Act (“TUTSA”), which displaced inconsistent common
law claims concerning conduct taking place after September 1, 2013, see ZeniMax Media, Inc. v. Oculus
VR, LLC, 166 F. Supp. 3d 697 (N.D. Tex. 2015), defines misappropriation as:
(A) acquisition of a trade secret of another by a person who knows or has reason to
know that the trade secret was acquired by improper means; or
(B) disclosure or use of a trade secret of another without express or implied consent
by a person who:
(i) used improper means to acquire knowledge of the trade secret;
(ii) at the time of disclosure or use, knew or had reason to know that the
person’s knowledge of the trade secret was:
(a) derived from or through a person who had utilized improper
means to acquire it;
(b) acquired under circumstances giving rise to a duty to maintain its
secrecy or limit its use; or
(c) derived from or through a person who owed a duty to the person
seeking relief to maintain its secrecy or limit its use; or
(iii) before a material change of the person’s position, knew or had reason to
know that it was a trade secret and that knowledge of it had been acquired by
accident or mistake.
Tex. Civ. Prac. & Rem. Code § 134A.002(3). “‘Improper means’ includes theft . . . [and] breach of a
duty to maintain secrecy . . . .” Id. § 134.002(2). 4
Defendant argues that Plaintiff cannot assert a claim for misappropriation of trade secrets
because it cannot establish that Defendant acquired Plaintiff’s trade secrets through improper means
or that it has suffered or is likely to suffer harm.
4
The definitions of misappropriation and improper means under the federal Defend Trade Secrets
Act are identical to those under TUTSA in all respects material to the analysis here. See 18 U.S.C.
§ 1839. Accordingly, the Court’s discussion of TUTSA is equally applicable to Plaintiff’s DTSA
claims.
14
1.
Improper Acquisition
Plaintiff alleges that Defendant acquired its trade secrets through improper means when he
retained his company-issued laptop and engineering notebooks. This, according to Plaintiff, was
both theft and in breach of Defendant’s contractual duty to return the items to Lifesize. Defendant,
on the other hand, argues that the 2004 Inventions Agreement was never assigned to Plaintiff, and
“without a contract there cannot be acquisition through improper means.” (Def.’s Mot. Dismiss,
Dkt. 13, at 15). Defendant further asserts that the computer and notebooks were at all times the
property of Logitech, and “there is nothing improper about [Defendant] accessing a Logitech
computer as a Logitech employee.” (Id.).
The Court agrees with Defendant that he did not acquire the trade secrets by improper
means. Rather, his initial access to the trade secrets at issue, as well as his possession of the laptop
and engineering notebooks containing them, were by permission of his employer. Plaintiff
acknowledges this in its pleadings. (Compl., Dkt. 1, ¶ 20 (“[Defendant] was entrusted with . . . much
of Lifesize’s most sensitive technological information . . . .”); id. ¶ 2 (noting that the laptop and
notebooks were issued to Defendant by the company)). While Defendant may have improperly
retained those items, he did not improperly acquire them. See Twister B.V. v. Newton Research Partners,
LP, 364 S.W.3d 428, 438 (Tex. App.—Dallas 2012, no pet.) (“[L]iability for a misappropriation of
trade secrets claim occurs if he discloses or uses another’s trade secrets, without privilege to do so, if
(a) he discovers the secret by improper means . . . .”) (emphasis added); 70 Tex. Jur. 3d Trademarks,
Etc. § 65 (“[A] misappropriation of trade secrets claim requires proof that the defendant . . . discovered
the secret by improper means . . . .”) (emphasis added).
Acquisition by improper means is not the sole path to liability under TUTSA, however. A
defendant can be liable for misappropriation of trade secrets if, at the time of the unauthorized use
or disclosure of the information, the defendant knew he obtained the information in circumstances
15
giving rise to a duty to maintain its secrecy. Id. § 134A.002(3)(B)(ii)(b). In other words, it is not
necessary for the defendant’s acquisition to be wrongful; the plaintiff may instead show that the
defendant permissibly acquired the information within a relationship of confidence and later
disclosed or used the information in violation of that confidence. See id. Plaintiff has adequately
alleged that Defendant acquired its trade secrets under a duty to maintain their secrecy. (Compl.,
Dkt. 1, at ¶ 50). The allegations that Defendant signed confidentiality agreements with both KMV
and Logitech suffice to show he knew or had reason to know of his duty of confidentiality. In these
circumstances, Defendant’s argument that he was entitled to access his laptop as a Logitech
employee is irrelevant. Whether or not Logitech owns the laptop, Defendant may still be liable for
misappropriation of trade secrets if he uses or discloses without authorization the trade secrets on
that laptop with knowledge that he is under a duty to maintain their secrecy. Plaintiff plausibly
alleges that Defendant is engaged in this conduct and has therefore stated a viable misappropriation
claim.
2.
Injury
Defendant argues that Plaintiff’s misappropriation claim fails because Plaintiff cannot
establish that it has suffered any injury or threatened injury because, according to Defendant,
Plaintiff has licensed its trade secrets to Logitech and thus Defendant’s disclosure or use of those
trade secrets in the course of his employment at Logitech cannot harm Plaintiff.
As an initial matter, Defendant appears to misconceive the requirements of TUTSA. In
order to obtain injunctive relief, TUTSA requires the plaintiff to establish “[a]ctual or threatened
misappropriation,” not actual or threatened injury. Tex. Civ. Prac. & Rem. Code § 134A.003(a)
(emphasis added). Misappropriation, as TUTSA defines it, does not require a showing of injury
beyond the improper acquisition or the unauthorized disclosure or use of its trade secrets. Id.
§ 134A.002(3). Of course, the nature and scope of injury has bearing on Plaintiff’s entitlement to
16
damages. Id. § 134A.004. As it concerns injunctive relief, however, the Court is of the view that the
issue of any licensing of Plaintiff’s IP to Logitech goes to whether Defendant is making use of
Plaintiff’s IP “without express or implied consent.” Id. § 134A.002(3)(B).
On this latter point, the basis for Defendant’s argument is the 2015 IPA, in which Plaintiff
granted Logitech a license to certain intellectual property. 5 However, that contract does not support
Defendant’s claim that Logitech possesses a license to the trade secrets at issue here. Clause 4.2 of
the 2015 IPA grants Logitech a license to Plaintiff’s “Company Other IP,” a defined term under the
agreement. (2015 IPA, Dkt. 13-4, at 102). The IPA defines “Company Other IP” as:
[A]ll items of [Intellectual Property Rights other than Patents, Domain Names and
Trademarks] owned by [Plaintiff] immediately following the Effective Date that are,
on the Effective Date, (i) embodied by, as works of authorship or otherwise, any
Technology used in or held for use in the operation of the business of Logitech
(which for clarity excludes the Business) and (ii) any information constituting Trade
Secrets retained in the unaided minds of Logitech personnel.
(Id. at 97). The “Business” exclusion in the definition of Company Other IP is critical. It
encompasses “the operations with respect to the designing, developing, having made, making,
marketing, distributing, operating and selling any of the Company Products,” (id.), including “highdefinition, digital video conferencing hardware (as well as embedded software).” (Id.).
The trade secrets claimed in this case relate to Plaintiff’s second-generation speakerphone, so
they plainly fall within its “Business” and thus the exclusion from the IP license retained by
Logitech. It also appears that Logitech’s license to the trade secrets retained in the unaided mind of
Logitech personnel is similarly inapplicable. Though Defendant argues he was a Logitech employee
5
Defendant also submits a 2010 License Agreement between LCI and Logitech Europe, S.A., in
which LCI grants Logitech Europe a non-exclusive worldwide license to use LCI’s IP. The Court is
not convinced that Plaintiff’s cursory allegation that the trade secrets were not the subject of any
technology licensed-back to Logitech suffices as a reference to this contract that renders it subject to
consideration on a Rule 12(b)(6) motion. See Brand Coupon Network, 748 F.3d at 634. Even if it were,
any license granted in 2010 to the trade secrets at issue would have been encompassed in Logitech’s
later transfer of “all of Logitech’s right, title and interest in and to” the IP to Plaintiff in the 2015
IPA, unless explicitly reserved in that agreement. (2015 IPA ¶ 2.1 (emphasis added)). In the Court’s
view, therefore, the 2015 IPA is the sole relevant agreement.
17
at all relevant times, the relevant time for the purposes of the license is December 28, 2015, the
effective date of the 2015 IPA. (2015 IPA, Dkt. 13-4, at 96 (“This [IPA] is made effective as of
December 28, 2015)). No one contends that Defendant was a Logitech employee on that date.
Accordingly, the license does not apply to any of Plaintiff’s trade secrets Defendant may have
retained in his unaided mind.
The Court cannot accept Defendant’s apparent suggestion that this license encompasses all
trade secrets in the minds of all employees who worked for Logitech at any time. It fights the most
natural reading of the contract, under which the phrase “on the Effective Date” modifies both
“retained in” and “Logitech personnel.” Under this reading, the license includes only such
information then known to those working for Logitech on December 28, 2015. Defendant’s
alternative reading would include the trade secrets held by any current or former employee of LCI or
Plaintiff who worked for those companies during the time they were owned by Logitech. There is
almost nothing that such a broad license would not include. Such an interpretation would render
meaningless the limitations placed on the scope of the license in the 2015 IPA and the further
clarification in its later amendment. See HighMount Exploration & Prod. LLC v. Harrison Interests, Ltd.,
503 S.W.3d 557, 562 (Tex. App.—Houston [14th Dist.] 2016, no pet.) (“To ascertain the parties’
intentions, we examine the entire agreement in an effort to harmonize and give effect to all
provisions of the contract so that none will be rendered meaningless.”). Further, to the extent the
2015 IPA is at all ambiguous on this point, the Court must construe the ambiguity in favor of the
Plaintiff. Lormand v. US Unwired, Inc., 565 F.3d 228, 239 (5th Cir. 2009) (“Usually, under Rule
12(b)(6), we must draw all reasonable inferences in the plaintiff’s favor.”).
As Plaintiff’s allegations concerning non-consent and damages are not undermined by any
license held by Logitech, the Court concludes that Plaintiff has adequately alleged these components
18
of its claims. Defendant has not challenged any other aspect of the claims, so the Court denies its
motion to dismiss Plaintiff’s trade secret misappropriation claims.
B.
Counts 4 and 6: Conversion and Theft
Defendant argues that Plaintiff’s claims for conversion and theft fail because they are based
on the conversion of intangible property and because the claims are preempted by the Texas
Uniform Trade Secrets Act. See Tex. Civ. Prac. & Rem. Code § 134A.007 (“[T]his chapter displaces
conflicting tort, restitutionary, and other law of this state providing civil remedies for
misappropriation of a trade secret.”).
The Court first turns to whether Plaintiff has alleged the conversion of intangible property
and then addresses the issue of preemption.
1.
Tangibility
“Texas conversion law . . . concerns only physical property.” Carson v. Dynegy, Inc., 344 F.3d
446, 456 (5th Cir. 2003). “Texas recognizes a limited exception to the tangibility requirement,
allowing conversion of intangible rights embodied in or ‘merged’ with unique paper documents.”
Beardmore v. Jacobsen, 131 F. Supp. 3d 656, 667 (S.D. Tex. 2015) (citing Prewitt v. Branham, 643 S.W.2d
122, 123 (Tex. 1982)). Where intangible rights have merged with a tangible document, “[t]he
conversion of the document in which the rights had been merged supports a conversion action for
the value of the rights represented by it.” Prewitt, 643 S.W.3d at 123.
Plaintiff’s conversion claims are based on Defendant’s alleged conversion of the laptop and
engineering notebooks, as well as “certain data, including Lifesize’s trade secrets and Proprietary
Information, that was contained on the Lifesize Laptop.” (Compl., Dkt. 1, ¶¶ 73–86). Insofar as
Plaintiff’s allegations are based on Defendant’s retention of physical items—the laptop and
notebooks—Plaintiff clearly has satisfied the tangibility requirement and thus has a conversion claim
19
for the value of these items (though not necessarily for the value of any trade secrets contained in
them, as discussed below).
Plaintiff’s allegations concerning the theft of data, however, are a different story. The weight
of authority suggests that computer files and other digital data cannot independently support a
conversion claim. See, e.g., Beardmore, 131 F. Supp. 3d 656, 667 (S.D. Tex. 2015) (finding that theft of
an iPhone application did not support a conversion claim and listing supporting authority); Quantlab
Techs. Ltd. (BVI) v. Godlevsky, 719 F. Supp. 2d 766, 779 (S.D. Tex. 2010) (finding that computer files
were not tangible property and did not support claim for conversion). The Court has found one case
within this circuit holding the contrary. See In re Yazoo Pipeline Co., L.P., 459 B.R. 636, 654–55 (Bankr.
S.D. Tex. 2011) (finding that the theft of seismic data supported conversion claim).
In Yazoo, the Bankruptcy Court found that seismic data stored on a computer could support
a conversion claim. Id. Relying on a Fifth Circuit case that found seismic data stored on tapes and
film to be tangible assets for federal taxation purposes, the court utilized a two-part test for
determining whether an asset is tangible for a conversion claim under Texas law: (i) whether it could
not exist apart from some physical storage medium, such as a computer, flash drive, tapes, or film;
and (ii) whether it could be accessed by a human user in a manner analogous to the access of
traditional tangible property.” Id. at 653 (citing Tex. Instruments Inc. v. United States, 551 F.2d 599 (5th
Cir. 1977)). To illustrate, the court posited a digital map: it could not exist without a storage medium
and can be viewed on a computer screen in a way similar to a traditional map. Id. It distinguished the
contrary holding of Quantlab by stating that the algorithms and mathematical models at issue were
processes that could not be accessed by a human user in a manner analogous to the access of
traditional tangible property. Id.
This Court finds Yazoo to be less convincing than the contrary holdings of other courts.
First, it relied largely on a holding that paper tapes and film negatives were tangible items for the
20
purposes federal tax law rather than on cases analyzing whether electronic data is tangible for a state
conversion claim. See id. 6 Of those cases discussing conversion claims, cases supporting its holding
concerned the laws of other states, whereas the cited cases involving Texas law were contrary to the
court’s holding. See id. Second, the Court hesitates to endorse Yazoo’s test for tangibility and its
application. It is difficult to imagine any digital data that can exist independently of a tangible storage
medium, such as a computer or flash drive. Further, in distinguishing Quantlab, the court appears to
overlook that the computer code constructing the predictive models in Quantlab could be rendered
as text and “accessed by a human user in a manner analogous to the access of traditional tangible
property.” See id. Indeed, Yazoo’s digital map is also comprised of set of coded instructions that,
when executed, operate to produce a visual rendering of a geographical area on a user’s computer
screen. The court provided no justification for expanding conversion claims to instructions and
algorithms that operate to produce something for which there is a familiar tangible analog while
denying protection to instructions and algorithms that do not.
This Court is sympathetic to the concerns of the New York Court of Appeals, reproduced in
Yazoo, that “electronic records that [are] stored on a computer [are] indistinguishable from printed
documents” and that “[i]t would be a curious jurisprudence that turned on the existence of a paper
document rather than an electronic one.” See Thyroff v. Nationwide Mut. Ins. Co., 8 N.Y.3d 283, 292–93
(N.Y. 2007). However, in situations like the current one—where the state courts have not spoken on
an issue—this Court is also mindful of its duty as a federal court sitting in diversity jurisdiction “not
[to] expand state law beyond its presently existing boundaries.” Barfield v. Madison County, Miss., 212
F.3d 269, 272 (5th Cir. 2000) (quoting Rubinstein v. Collins, 20 F.3d 160, 172 (5th Cir. 1995) (en banc)
(“We have long followed the principle that we will not create ‘innovative theories of recovery or
It seems uncontroversial that the paper tapes and film negatives in Texas Instruments would be
tangible items for the purposes of state conversion law, too.
6
21
defense’ under local law, but will rather merely apply it ‘as it currently exists.’”)). Yazoo does not
convince the Court to expand the scope of Texas law to cover the conversion of digital data files.
Accordingly, the Court grants Defendant’s motion to dismiss Plaintiff’s conversion claims to
the extent they are premised on the conversion of its data.
2.
Preemption
As noted above, TUTSA provides that it preempts all “conflicting tort, restitutionary, and
other laws of this state providing civil remedies for misappropriation of a trade secret.” Tex. Civ.
Prac. & Rem. Code § 134A.007(a). Excluded from the scope of preemption are “contractual
remedies,” “other civil remedies that are not based upon misappropriation of a trade secret,” and
“criminal remedies.” Id. § 134A.007(b).
Defendant asserts that Plaintiff’s conversion and theft claims fall within TUTSA’s
preemption provision to the extent they are based on Defendant’s conversion or theft of trade
secrets. Plaintiff responds that Defendant mischaracterizes its claims, which are not for the
conversion or theft of the trade secrets themselves, but for the theft and conversion of the property
carrying the trade secrets.
Liability for misappropriation of trade secrets does not distinguish between the forms a trade
secret may take. Proprietary information may constitute a protectable trade secret whether it is
written on paper, stored in a computer file, or contained in the memory of a former employee. See In
re Cooper Tire & Rubber Co., 313 S.W.3d 910, 918 (Tex. App.—Houston [14th Dist.] 2010, no pet.)
(trade secrets contained in documents); Trilogy Software, Inc. v. Callidus Software, Inc., 143 S.W.3d 452,
464–65 (Tex. App.—Austin 2004, pet. denied) (trade secrets contained in ZIP files); Bayco Prods., Inc.
v. Lynch, 3:10-CV-1820-D, 2011 WL 1602571, at *4 (N.D. Tex. 2011) (former employee’s “knowhow” was plausibly a trade secret). Where a plaintiff shows a defendant has stolen an item
containing or representing the plaintiff’s trade secret, the plaintiff has established no more than the
22
elements of misappropriation under TUTSA. See Tex. Civ. Prac. & Rem. Code § 134A.002(2)–(3)
(“Misappropriation means: acquisition of a trade secret of another by a person who knows . . . [it]
was acquired by [theft] . . . .”); 360 Mortg. Grp., LLC v. Homebridge Fin. Servs, Inc., A:14-CA-00847-SS,
2016 WL 900577, at *6 (W.D. Tex. Mar. 2, 2016) (“A claim is not preempted if the plaintiff is able
to show the claim is based on facts unrelated to the misappropriation of the trade secret.”).
This does not mean that all claims for conversion or theft of items containing trade secrets
are preempted by TUTSA. The intent of the law’s preemption provision is only to “prevent
inconsistent theories of relief for the same underlying harm . . . .” 360 Mortg. Grp., 2016 WL 900577,
at *6 (quoting Smithfield Ham and Prods. Co., Inc. v. Portion Pac, Inc., 905 F. Supp. 346, 348 (E.D. Va.
1995)). Where the plaintiff’s conversion or theft claim is addressed to the harm stemming from the
loss of the tangible item itself, rather than the trade secret it contains, it seeks relief from harm other
than for the misappropriation of its trade secret. Its remedy is then the value of the item or the
return of the property and damages for loss of use. R.J. Suarez Ents. Inc. v. PNYX L.P., 380 S.W.3d
238, 242 (Tex. App. 2012). Where the plaintiff directs its conversion claim at the loss of the
intangible right contained or integrated with the tangible item, its claim clearly addresses and seeks
recovery for the same harm contemplated by TUTSA. See Tex. Civ. Prac. & Rem. Code §
134A.002(3). It thus falls within the language of TUTSA’s preemption statute. See id. § 134A.007.
To the extent Plaintiff’s conversion and theft claims seek recovery for the value of the
property bearing its trade secrets, namely, the notebooks and laptop, they constitute “other civil
remedies that are not based upon misappropriation of a trade secret.” See id. § 134A.007(b)(2). The
Court therefore denies Defendant’s motion to dismiss these claims on grounds of preemption. If
successful, Plaintiff may seek to recover the value of those items. See R.J. Suarez Ents., 380 S.W.3d at
242. However, the Court dismisses Plaintiff’s claims to the extent Plaintiff seeks to recover the value
23
of the trade secret under a theory that its intangible rights have merged with computer or notebooks.
As explained above, the Court finds this remedy to be preempted by TUTSA.
CONCLUSION
For the reasons stated above, the court DENIES Defendant’s Motion to Dismiss under
Rule 12(b)(1), and GRANTS IN PART and DENIES IN PART Defendant’s Motion to Dismiss
under Rule 12(b)(6). Plaintiff’s conversion claims are DISMISSED to the extent they rely on the
conversion of electronic data. Plaintiff’s conversion and theft claims are DISMISSED to the extent
they seek recovery of the value of Plaintiff’s trade secrets. Defendant’s motion is otherwise
DENIED. (Dkt. 13).
SIGNED on April 26, 2017.
_____________________________________
ROBERT PITMAN
UNITED STATES DISTRICT JUDGE
24
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?